Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.
To help educate website owners about potential threats to their environments, we’ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.
The vulnerabilities listed below are virtually patched by the Sucuri Firewall and existing clients are protected. If you don’t have it installed yet, you can use our web application firewall to protect your site against known vulnerabilities.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-1206 Number of Installations: 10,000,000+ Affected Software: Elementor Website Builder – more than just a page builder <= 3.35.7 Patched Versions: Elementor Website Builder – more than just a page builder 3.35.8
Mitigation steps: Update to Elementor Website Builder – more than just a page builder version 3.35.8 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3427 Number of Installations: 10,000,000+ Affected Software: Yoast SEO – Advanced SEO with real-time guidance and built-in AI <= 27.1 Patched Versions: Yoast SEO – Advanced SEO with real-time guidance and built-in AI 27.2
Mitigation steps: Update to Yoast SEO – Advanced SEO with real-time guidance and built-in AI version 27.2 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-25339 Number of Installations: 6,000,000+ Affected Software: WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More <= 1.9.9.1 Patched Versions: WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More 1.9.9.2
Mitigation steps: Update to WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More version 1.9.9.2 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-1217 Number of Installations: 4,000,000+ Affected Software: Yoast Duplicate Post <= 4.5 Patched Versions: Yoast Duplicate Post 4.6
Mitigation steps: Update to Yoast Duplicate Post version 4.6 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-32461 Number of Installations: 3,000,000+ Affected Software: Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) <= 9.5.7 Patched Versions: Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) 9.5.8
Mitigation steps: Update to Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) version 9.5.8 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2389 Number of Installations: 1,000,000+ Affected Software: Complianz – GDPR/CCPA Cookie Consent <= 7.4.4 Patched Versions: Complianz – GDPR/CCPA Cookie Consent 7.4.5
Mitigation steps: Update to Complianz – GDPR/CCPA Cookie Consent version 7.4.5 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-1781 Number of Installations: 1,000,000+ Affected Software: MC4WP: Mailchimp for WordPress <= 4.11.9 Patched Versions: MC4WP: Mailchimp for WordPress 4.12.0
Mitigation steps: Update to MC4WP: Mailchimp for WordPress version 4.12.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2430 Number of Installations: 900,000+ Affected Software: Autoptimize <= 3.1.14 Patched Versions: Autoptimize 3.1.15
Mitigation steps: Update to Autoptimize version 3.1.15 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2352 Number of Installations: 900,000+ Affected Software: Autoptimize <= 3.1.14 Patched Versions: Autoptimize 3.1.15
Mitigation steps: Update to Autoptimize version 3.1.15 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: Arbitrary Code Execution CVE: CVE-2026-27384 Number of Installations: 900,000+ Affected Software: W3 Total Cache <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Arbitrary File Download CVE: CVE-2026-3098 Number of Installations: 800,000+ Affected Software: Smart Slider 3 <= 3.5.1.33 Patched Versions: Smart Slider 3 3.5.1.34
Mitigation steps: Update to Smart Slider 3 version 3.5.1.34 or greater.
Security Risk: High Exploitation Level: Requires Author or higher level authentication. Vulnerability: Arbitrary File Download CVE: CVE-2026-3585 Number of Installations: 700,000+ Affected Software: The Events Calendar <= 6.15.17 Patched Versions: The Events Calendar 6.15.17.1
Mitigation steps: Update to The Events Calendar version 6.15.17.1 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-1307 Number of Installations: 600,000+ Affected Software: Ninja Forms – The Contact Form Builder That Grows With You <= 3.14.1 Patched Versions: Ninja Forms – The Contact Form Builder That Grows With You 3.14.2
Mitigation steps: Update to Ninja Forms – The Contact Form Builder That Grows With You version 3.14.2 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-2373 Number of Installations: 600,000+ Affected Software: Royal Addons for Elementor – Addons and Templates Kit for Elementor <= 1.7.1049 Patched Versions: Royal Addons for Elementor – Addons and Templates Kit for Elementor 1.7.1050
Mitigation steps: Update to Royal Addons for Elementor – Addons and Templates Kit for Elementor version 1.7.1050 or greater.
Security Risk: High Exploitation Level: Requires Author or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2025-13067 Number of Installations: 600,000+ Affected Software: Royal Addons for Elementor – Addons and Templates Kit for Elementor <= 1.7.1049 Patched Versions: Royal Addons for Elementor – Addons and Templates Kit for Elementor 1.7.1050
Mitigation steps: Update to Royal Addons for Elementor – Addons and Templates Kit for Elementor version 1.7.1050 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-2732 Number of Installations: 600,000+ Affected Software: Enable Media Replace <= 4.1.7 Patched Versions: Enable Media Replace 4.1.8
Mitigation steps: Update to Enable Media Replace version 4.1.8 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Other Vulnerability Type CVE: CVE-2026-28135 Number of Installations: 600,000+ Affected Software: Royal Addons for Elementor – Addons and Templates Kit for Elementor <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Bypass Vulnerability CVE: CVE-2026-27411 Number of Installations: 600,000+ Affected Software: SiteGuard WP Plugin <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or replacing the plugin.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-2413 Number of Installations: 500,000+ Affected Software: Ally – Web Accessibility & Usability <= 4.0.9 Patched Versions: Ally – Web Accessibility & Usability 4.1.0
Mitigation steps: Update to Ally – Web Accessibility & Usability version 4.1.0 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3231 Number of Installations: 500,000+ Affected Software: Checkout Field Editor (Checkout Manager) for WooCommerce <= 2.1.7 Patched Versions: Checkout Field Editor (Checkout Manager) for WooCommerce 2.1.8
Mitigation steps: Update to Checkout Field Editor (Checkout Manager) for WooCommerce version 2.1.8 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-1841 Number of Installations: 500,000+ Affected Software: PixelYourSite – Your smart PIXEL (TAG) & API Manager <= 11.2.0 Patched Versions: PixelYourSite – Your smart PIXEL (TAG) & API Manager 11.2.0.1
Mitigation steps: Update to PixelYourSite – Your smart PIXEL (TAG) & API Manager version 11.2.0.1 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Arbitrary File Deletion CVE: CVE-2025-14675 Number of Installations: 500,000+ Affected Software: Meta Box <= 5.11.1 Patched Versions: Meta Box 5.11.2
Mitigation steps: Update to Meta Box version 5.11.2 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Local File Inclusion CVE: CVE-2026-2448 Number of Installations: 500,000+ Affected Software: Page Builder by SiteOrigin <= 2.33.9 Patched Versions: Page Builder by SiteOrigin 2.34.0
Mitigation steps: Update to Page Builder by SiteOrigin version 2.34.0 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-4987 Number of Installations: 500,000+ Affected Software: SureForms – Contact Form, Payment Form & Other Custom Form Builder <= 2.5.9 Patched Versions: SureForms – Contact Form, Payment Form & Other Custom Form Builder 2.6.0
Mitigation steps: Update to SureForms – Contact Form, Payment Form & Other Custom Form Builder version 2.6.0 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-27370 Number of Installations: 400,000+ Affected Software: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button – Chaty <= 3.5.1 Patched Versions: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button – Chaty 3.5.2
Mitigation steps: Update to Chaty version 3.5.2 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-2917 Number of Installations: 400,000+ Affected Software: Happy Addons for Elementor <= 3.21.0 Patched Versions: Happy Addons for Elementor 3.21.1
Mitigation steps: Update to Happy Addons for Elementor version 3.21.1 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2918 Number of Installations: 400,000+ Affected Software: Happy Addons for Elementor <= 3.21.0 Patched Versions: Happy Addons for Elementor 3.21.1
Mitigation steps: Update to Happy Addons for Elementor version 3.21.1 or greater.
Security Risk: High Exploitation Level: Requires Author or higher level authentication. Vulnerability: Local File Inclusion CVE: CVE-2026-1463 Number of Installations: 400,000+ Affected Software: Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery <= 4.0.4 Patched Versions: Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery 4.0.5
Mitigation steps: Update to NextGEN Gallery version 4.0.5 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3090 Number of Installations: 400,000+ Affected Software: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App <= 3.8.9 Patched Versions: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App 3.9.0
Mitigation steps: Update to Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App version 3.9.0 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-2559 Number of Installations: 400,000+ Affected Software: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App <= 3.8.9 Patched Versions: Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App 3.9.0
Mitigation steps: Update to Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App version 3.9.0 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Content Injection CVE: CVE-2026-2442 Number of Installations: 400,000+ Affected Software: Page Builder: Pagelayer – Drag and Drop website builder <= 2.0.7 Patched Versions: Page Builder: Pagelayer – Drag and Drop website builder 2.0.8
Mitigation steps: Update to Page Builder: Pagelayer – Drag and Drop website builder version 2.0.8 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4335 Number of Installations: 300,000+ Affected Software: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF <= 6.4.3 Patched Versions: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF 6.4.4
Mitigation steps: Update to ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF version 6.4.4 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4268 Number of Installations: 300,000+ Affected Software: WP Go Maps (formerly WP Google Maps) <= 10.0.05 Patched Versions: WP Go Maps (formerly WP Google Maps) 10.0.06
Mitigation steps: Update to WP Go Maps (formerly WP Google Maps) version 10.0.06 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: PHP Object Injection CVE: CVE-2026-2471 Number of Installations: 300,000+ Affected Software: WP Mail Logging <= 1.15 Patched Versions: WP Mail Logging 1.16
Mitigation steps: Update to WP Mail Logging version 1.16 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Authentication CVE: CVE-2026-2888 Number of Installations: 300,000+ Affected Software: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder <= 6.28 Patched Versions: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder 6.29
Mitigation steps: Update to Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder version 6.29 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-2890 Number of Installations: 300,000+ Affected Software: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder <= 6.28 Patched Versions: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder 6.29
Mitigation steps: Update to Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder version 6.29 or greater.
Security Risk: Critical Exploitation Level: Custom role Vulnerability: Privilege Escalation CVE: CVE-2026-1993 Number of Installations: 300,000+ Affected Software: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) <= 9.0.2 Patched Versions: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) 9.0.3
Mitigation steps: Update to ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) version 9.0.3 or greater.
Security Risk: High Exploitation Level: Custom role Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-1992 Number of Installations: 300,000+ Affected Software: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) <= 9.0.2 Patched Versions: ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) 9.0.3
Mitigation steps: Update to ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) version 9.0.3 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2724 Number of Installations: 300,000+ Affected Software: Unlimited Elements For Elementor <= 2.0.5 Patched Versions: Unlimited Elements For Elementor 2.0.6
Mitigation steps: Update to Unlimited Elements For Elementor version 2.0.6 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Privilege Escalation CVE: CVE-2026-4248 Number of Installations: 200,000+ Affected Software: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin <= 2.11.2 Patched Versions: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin 2.11.3
Mitigation steps: Update to Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin version 2.11.3 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2569 Number of Installations: 100,000+ Affected Software: Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer <= 2.4.26 Patched Versions: Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer 2.4.27
Mitigation steps: Update to Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer version 2.4.27 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-1236 Number of Installations: 100,000+ Affected Software: Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More <= 1.12.3 Patched Versions: Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More 1.12.4
Mitigation steps: Update to Envira Gallery – Image Photo Gallery, Albums, Video Gallery, Slideshows & More version 1.12.4 or greater.
Security Risk: Critical Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Remote Code Execution (RCE) CVE: CVE-2026-27984 Number of Installations: 100,000+ Affected Software: Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.
Security Risk: Critical Exploitation Level: Requires Editor or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-23802 Number of Installations: 100,000+ Affected Software: AI Engine – The Chatbot, AI Framework & MCP for WordPress <= 3.3.2 Patched Versions: AI Engine – The Chatbot, AI Framework & MCP for WordPress 3.3.3
Mitigation steps: Update to AI Engine – The Chatbot, AI Framework & MCP for WordPress version 3.3.3 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-2571 Number of Installations: 100,000+ Affected Software: Download Manager <= 3.3.49 Patched Versions: Download Manager 3.3.50
Mitigation steps: Update to Download Manager version 3.3.50 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-32533 Number of Installations: 100,000+ Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.6 Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.7
Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.7 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2324 Number of Installations: 100,000+ Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.7 Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.8
Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.8 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-1487 Number of Installations: 100,000+ Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.7 Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.8
Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.8 or greater.
Security Risk: High Exploitation Level: Requires Agent or higher level authentication. Vulnerability: Privilege Escalation CVE: CVE-2026-1566 Number of Installations: 100,000+ Affected Software: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.7 Patched Versions: LatePoint – Calendar Booking Plugin for Appointments and Events 5.2.8
Mitigation steps: Update to LatePoint – Calendar Booking Plugin for Appointments and Events version 5.2.8 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-3657 Number of Installations: 100,000+ Affected Software: My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) <= 2.8.6 Patched Versions: My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) 2.8.7
Mitigation steps: Update to My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) version 2.8.7 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4063 Number of Installations: 100,000+ Affected Software: Social Icons Widget & Block – Social Media Icons & Share Buttons <= 4.5.8 Patched Versions: Social Icons Widget & Block – Social Media Icons & Share Buttons 4.5.9
Mitigation steps: Update to Social Icons Widget & Block – Social Media Icons & Share Buttons version 4.5.9 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2025-32223 Number of Installations: 100,000+ Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.4 Patched Versions: Tutor LMS – eLearning and online course solution 3.9.5
Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.5 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-23799 Number of Installations: 100,000+ Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.5 Patched Versions: Tutor LMS – eLearning and online course solution 3.9.6
Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.6 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2025-13673 Number of Installations: 100,000+ Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.6 Patched Versions: Tutor LMS – eLearning and online course solution 3.9.7
Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.7 or greater.
Security Risk: High Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-3453 Number of Installations: 100,000+ Affected Software: Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.16.11 Patched Versions: Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress 4.16.12
Mitigation steps: Update to Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress version 4.16.12 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2830 Number of Installations: 100,000+ Affected Software: WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets <= 4.0.0 Patched Versions: WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets 4.0.1
Mitigation steps: Update to WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets version 4.0.1 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-3124 Number of Installations: 90,000+ Affected Software: Download Monitor <= 5.1.7 Patched Versions: Download Monitor 5.1.8
Mitigation steps: Update to Download Monitor version 5.1.8 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Arbitrary File Download CVE: CVE-2026-4373 Number of Installations: 90,000+ Affected Software: JetFormBuilder — Dynamic Blocks Form Builder <= 3.5.6.2 Patched Versions: JetFormBuilder — Dynamic Blocks Form Builder 3.5.6.3
Mitigation steps: Update to JetFormBuilder — Dynamic Blocks Form Builder version 3.5.6.3 or greater.
Security Risk: Critical Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Remote Code Execution (RCE) CVE: CVE-2026-32525 Number of Installations: 90,000+ Affected Software: JetFormBuilder — Dynamic Blocks Form Builder <= 3.5.6.1 Patched Versions: JetFormBuilder — Dynamic Blocks Form Builder 3.5.6.2
Mitigation steps: Update to JetFormBuilder — Dynamic Blocks Form Builder version 3.5.6.2 or greater.
Security Risk: High Exploitation Level: Custom role Vulnerability: Privilege Escalation CVE: CVE-2026-24963 Number of Installations: 90,000+ Affected Software: Booking for Appointments and Events Calendar – Amelia <= 1.9.9 Patched Versions: Booking for Appointments and Events Calendar – Amelia 2.0
Mitigation steps: Update to Booking for Appointments and Events Calendar – Amelia version 2.0 or greater.
Security Risk: High Exploitation Level: Requires Customer or higher level authentication. Vulnerability: Broken Authentication CVE: CVE-2026-2931 Number of Installations: 90,000+ Affected Software: Booking for Appointments and Events Calendar – Amelia <= 9.1 Patched Versions: Booking for Appointments and Events Calendar – Amelia 9.2
Mitigation steps: Update to Booking for Appointments and Events Calendar – Amelia version 9.2 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Privilege Escalation CVE: CVE-2026-3629 Number of Installations: 80,000+ Affected Software: Import and export users and customers <= 1.9.9 Patched Versions: Import and export users and customers 2.0
Mitigation steps: Update to Import and export users and customers version 2.0 or greater.
Security Risk: High Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3533 Number of Installations: 80,000+ Affected Software: Jupiter X Core <= 4.14.1 Patched Versions: Jupiter X Core 4.14.2
Mitigation steps: Update to Jupiter X Core version 4.14.2 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-1238 Number of Installations: 80,000+ Affected Software: SlimStat Analytics <= 5.3.9 Patched Versions: SlimStat Analytics 5.4.0
Mitigation steps: Update to SlimStat Analytics version 5.4.0 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3225 Number of Installations: 80,000+ Affected Software: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses <= 4.3.2 Patched Versions: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses 4.3.3
Mitigation steps: Update to LearnPress – WordPress LMS Plugin for Create and Sell Online Courses version 4.3.3 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3226 Number of Installations: 80,000+ Affected Software: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses <= 4.3.2 Patched Versions: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses 4.3.3
Mitigation steps: Update to LearnPress – WordPress LMS Plugin for Create and Sell Online Courses version 4.3.3 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-32540 Number of Installations: 70,000+ Affected Software: Online Scheduling and Appointment Booking System – Bookly <= 26.7 Patched Versions: Online Scheduling and Appointment Booking System – Bookly 26.8
Mitigation steps: Update to Online Scheduling and Appointment Booking System – Bookly version 26.8 or greater.
Security Risk: Medium Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Path Traversal CVE: CVE-2026-3474 Number of Installations: 70,000+ Affected Software: EmailKit – Email Customizer for WooCommerce & WP <= 1.6.3 Patched Versions: EmailKit – Email Customizer for WooCommerce & WP 1.6.4
Mitigation steps: Update to EmailKit – Email Customizer for WooCommerce & WP version 1.6.4 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-32538 Number of Installations: 70,000+ Affected Software: SMTP Mailer <= 1.1.24 Patched Versions: SMTP Mailer 1.1.25
Mitigation steps: Update to SMTP Mailer version 1.1.25 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2257 Number of Installations: 70,000+ Affected Software: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools <= 4.3.2 Patched Versions: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools 4.3.3
Mitigation steps: Update to GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools version 4.3.3 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-2879 Number of Installations: 70,000+ Affected Software: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools <= 4.3.2 Patched Versions: GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools 4.3.3
Mitigation steps: Update to GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools version 4.3.3 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: PHP Object Injection CVE: CVE-2026-2599 Number of Installations: 70,000+ Affected Software: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.7 Patched Versions: Database for Contact Form 7, WPforms, Elementor forms 1.4.8
Mitigation steps: Update to Database for Contact Form 7, WPforms, Elementor forms version 1.4.8 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-2371 Number of Installations: 70,000+ Affected Software: Greenshift – animation and page builder blocks <= 12.8.3 Patched Versions: Greenshift – animation and page builder blocks 12.8.4
Mitigation steps: Update to Greenshift – animation and page builder blocks version 12.8.4 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-2589 Number of Installations: 70,000+ Affected Software: Greenshift – animation and page builder blocks <= 12.8.3 Patched Versions: Greenshift – animation and page builder blocks 12.8.4
Mitigation steps: Update to Greenshift – animation and page builder blocks version 12.8.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2593 Number of Installations: 70,000+ Affected Software: Greenshift – animation and page builder blocks <= 12.8.5 Patched Versions: Greenshift – animation and page builder blocks 12.8.6
Mitigation steps: Update to Greenshift – animation and page builder blocks version 12.8.6 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3072 Number of Installations: 70,000+ Affected Software: Media Library Assistant <= 3.33 Patched Versions: Media Library Assistant 3.34
Mitigation steps: Update to Media Library Assistant version 3.34 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Local File Inclusion CVE: CVE-2026-28039 Number of Installations: 70,000+ Affected Software: wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 6.5.0.1 Patched Versions: wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin 6.5.0.2
Mitigation steps: Update to wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin version 6.5.0.2 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2358 Number of Installations: 70,000+ Affected Software: WP ULike – Like & Dislike Buttons for Engagement and Feedback <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or removing the plugin until a fix is released.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-3045 Number of Installations: 60,000+ Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.9 Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.10.0
Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.10.0 or greater.
Security Risk: Medium Exploitation Level: Requires Staff or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-1704 Number of Installations: 60,000+ Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.9 Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.10.0
Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.10.0 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-1708 Number of Installations: 60,000+ Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.9.28 Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.9.29
Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.9.29 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-3658 Number of Installations: 60,000+ Affected Software: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.10.1 Patched Versions: Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin 1.6.10.2
Mitigation steps: Update to Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin version 1.6.10.2 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-32565 Number of Installations: 60,000+ Affected Software: Contextual Related Posts <= 4.2.1 Patched Versions: Contextual Related Posts 4.2.2
Mitigation steps: Update to Contextual Related Posts version 4.2.2 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: Arbitrary File Upload CVE: CVE-2026-3459 Number of Installations: 60,000+ Affected Software: Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.5 Patched Versions: Drag and Drop Multiple File Upload for Contact Form 7 1.3.9.6
Mitigation steps: Update to Drag and Drop Multiple File Upload for Contact Form 7 version 1.3.9.6 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-1651 Number of Installations: 60,000+ Affected Software: Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress <= 5.9.16 Patched Versions: Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress 5.9.17
Mitigation steps: Update to Email Subscribers & Newsletters – Email Marketing, Post Notifications & Newsletter Plugin for WordPress version 5.9.17 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-2893 Number of Installations: 60,000+ Affected Software: Fast Page & Post Duplicator <= 6.3 Patched Versions: Fast Page & Post Duplicator 6.4
Mitigation steps: Update to Fast Page & Post Duplicator version 6.4 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-3058 Number of Installations: 60,000+ Affected Software: Seraphinite Accelerator <= 2.28.14 Patched Versions: Seraphinite Accelerator 2.28.15
Mitigation steps: Update to Seraphinite Accelerator version 2.28.15 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3056 Number of Installations: 60,000+ Affected Software: Seraphinite Accelerator <= 2.28.14 Patched Versions: Seraphinite Accelerator 2.28.15
Mitigation steps: Update to Seraphinite Accelerator version 2.28.15 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-3138 Number of Installations: 60,000+ Affected Software: Product Filter for WooCommerce by WBW <= 3.1.2 Patched Versions: Product Filter for WooCommerce by WBW 3.1.3
Mitigation steps: Update to Product Filter for WooCommerce by WBW version 3.1.3 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: Privilege Escalation CVE: CVE-2026-1492 Number of Installations: 60,000+ Affected Software: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder <= 5.1.2 Patched Versions: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder 5.1.3
Mitigation steps: Update to User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder version 5.1.3 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Privilege Escalation CVE: CVE-2026-32488 Number of Installations: 60,000+ Affected Software: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder <= 5.1.2 Patched Versions: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder 5.1.3
Mitigation steps: Update to User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder version 5.1.3 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4056 Number of Installations: 60,000+ Affected Software: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder <= 5.1.4 Patched Versions: User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder 5.1.5
Mitigation steps: Update to User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder version 5.1.5 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-32460 Number of Installations: 60,000+ Affected Software: Ultra Addons for Contact Form 7 <= 3.5.36 Patched Versions: Ultra Addons for Contact Form 7 3.5.37
Mitigation steps: Update to Ultra Addons for Contact Form 7 version 3.5.37 or greater.
Security Risk: High Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Local File Inclusion CVE: CVE-2026-32537 Number of Installations: 60,000+ Affected Software: Visual Portfolio, Photo Gallery & Post Grid <= 3.5.1 Patched Versions: Visual Portfolio, Photo Gallery & Post Grid 3.5.2
Mitigation steps: Update to Visual Portfolio, Photo Gallery & Post Grid version 3.5.2 or greater.
Security Risk: Critical Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Remote Code Execution (RCE) CVE: CVE-2026-25366 Number of Installations: 60,000+ Affected Software: Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts <= 2.7.1 Patched Versions: Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts 2.7.2
Mitigation steps: Update to Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts version 2.7.2 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-3222 Number of Installations: 60,000+ Affected Software: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters <= 4.9.1 Patched Versions: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters 4.9.2
Mitigation steps: Update to WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters version 4.9.2 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-2580 Number of Installations: 60,000+ Affected Software: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters <= 4.9.1 Patched Versions: WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters 4.9.2
Mitigation steps: Update to WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters version 4.9.2 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-32457 Number of Installations: 50,000+ Affected Software: Advanced Product Fields (Product Addons) for WooCommerce <= 1.6.18 Patched Versions: Advanced Product Fields (Product Addons) for WooCommerce 1.6.19
Mitigation steps: Update to Advanced Product Fields (Product Addons) for WooCommerce version 1.6.19 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4331 Number of Installations: 50,000+ Affected Software: Blog2Social: Social Media Auto Post & Scheduler <= 8.8.2 Patched Versions: Blog2Social: Social Media Auto Post & Scheduler 8.8.3
Mitigation steps: Update to Blog2Social: Social Media Auto Post & Scheduler version 8.8.3 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-12473 Number of Installations: 50,000+ Affected Software: RTMKit <= 1.9.9 Patched Versions: RTMKit 2.0.0
Mitigation steps: Update to RTMKit version 2.0.0 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2433 Number of Installations: 50,000+ Affected Software: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.11 Patched Versions: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging 5.0.12
Mitigation steps: Update to RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging version 5.0.12 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3034 Number of Installations: 50,000+ Affected Software: OoohBoi Steroids for Elementor <= 2.1.24 Patched Versions: OoohBoi Steroids for Elementor 2.1.25
Mitigation steps: Update to OoohBoi Steroids for Elementor version 2.1.25 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-6229 Number of Installations: 50,000+ Affected Software: Sina Extension for Elementor <= 3.7.0 Patched Versions: Sina Extension for Elementor 3.7.1
Mitigation steps: Update to Sina Extension for Elementor version 3.7.1 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4066 Number of Installations: 50,000+ Affected Software: Smart Custom Fields <= 5.0.6 Patched Versions: Smart Custom Fields 5.0.7
Mitigation steps: Update to Smart Custom Fields version 5.0.7 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-2269 Number of Installations: 50,000+ Affected Software: Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin <= 7.0.9 Patched Versions: Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin 7.1.0
Mitigation steps: Update to Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin version 7.1.0 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-2363 Number of Installations: 50,000+ Affected Software: WP-Members Membership Plugin <= 3.5.5 Patched Versions: WP-Members Membership Plugin 3.5.6
Mitigation steps: Update to WP-Members Membership Plugin version 3.5.6 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2433 Number of Installations: 50,000+ Affected Software: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.11 Patched Versions: RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging 5.0.12
Mitigation steps: Update to RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging version 5.0.12 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3534 Number of Downloads: 21,720,242 Affected Software: Astra <= 4.12.3 Patched Versions: Astra 4.12.4
Mitigation steps: Update to Astra theme version 4.12.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2583 Number of Downloads: 6,306,227 Affected Software: Blocksy <= 2.1.30 Patched Versions: Blocksy 2.1.31
Mitigation steps: Update to Blocksy theme version 2.1.31 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Local File Inclusion CVE: CVE-2026-28119 Number of Downloads: 773,853 Affected Software: Nirvana <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or replacing the theme.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-25009 Number of Downloads: 483,880 Affected Software: Education Zone <= 1.3.8 Patched Versions: Education Zone 1.3.9
Mitigation steps: Update to Education Zone theme version 1.3.9 or greater.
Security Risk: Critical Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-32482 Number of Downloads: 243,101 Affected Software: Ona <= 1.23 Patched Versions: Ona 1.24
Mitigation steps: Update to Ona theme version 1.24 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-24382 Number of Downloads: 76,558 Affected Software: News Magazine X <= 1.2.50 Patched Versions: News Magazine X 1.2.51
Mitigation steps: Update to News Magazine X theme version 1.2.51 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: PHP Object Injection CVE: CVE-2026-22475 Number of Downloads: 58,132 Affected Software: Estate <= latest Patched Versions: No Fix
Mitigation steps: No patch available. Consider disabling or replacing the theme.
Update your website software to mitigate risk. Users who are not able to update their software with the latest version are encouraged to use a web application firewall to help virtually patch known vulnerabilities and protect their website.